diff --git a/pkg/policies/opa/rego/azure/azurerm_application_gateway/accurics.azure.NS.147.json b/pkg/policies/opa/rego/azure/azurerm_application_gateway/accurics.azure.NS.147.json index 7f0e5ea92..186001404 100755 --- a/pkg/policies/opa/rego/azure/azurerm_application_gateway/accurics.azure.NS.147.json +++ b/pkg/policies/opa/rego/azure/azurerm_application_gateway/accurics.azure.NS.147.json @@ -7,6 +7,6 @@ "severity": "MEDIUM", "description": "Ensure Azure Application Gateway Web application firewall (WAF) is enabled", "reference_id": "accurics.azure.NS.147", - "category": "Network Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_container_registry/accurics.azure.AKS.3.json b/pkg/policies/opa/rego/azure/azurerm_container_registry/accurics.azure.AKS.3.json index b0ad52b44..ccf5ecb2e 100755 --- a/pkg/policies/opa/rego/azure/azurerm_container_registry/accurics.azure.AKS.3.json +++ b/pkg/policies/opa/rego/azure/azurerm_container_registry/accurics.azure.AKS.3.json @@ -7,6 +7,6 @@ "severity": "HIGH", "description": "Ensure Container Registry has locks", "reference_id": "accurics.azure.AKS.3", - "category": "Azure Container Services", + "category": "Resilience", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_container_registry/accurics.azure.EKM.164.json b/pkg/policies/opa/rego/azure/azurerm_container_registry/accurics.azure.EKM.164.json index 9d6ce08cc..5c6529978 100755 --- a/pkg/policies/opa/rego/azure/azurerm_container_registry/accurics.azure.EKM.164.json +++ b/pkg/policies/opa/rego/azure/azurerm_container_registry/accurics.azure.EKM.164.json @@ -7,6 +7,6 @@ "severity": "MEDIUM", "description": "Ensure that admin user is disabled for Container Registry", "reference_id": "accurics.azure.EKM.164", - "category": "Encryption and Key Management", + "category": "Identity and Access Management", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_cosmosdb_account/accurics.azure.CAM.162.json b/pkg/policies/opa/rego/azure/azurerm_cosmosdb_account/accurics.azure.CAM.162.json index 8dcdf45b7..8a0fbbaa4 100755 --- a/pkg/policies/opa/rego/azure/azurerm_cosmosdb_account/accurics.azure.CAM.162.json +++ b/pkg/policies/opa/rego/azure/azurerm_cosmosdb_account/accurics.azure.CAM.162.json @@ -7,6 +7,6 @@ "severity": "MEDIUM", "description": "Ensure that Cosmos DB Account has an associated tag", "reference_id": "accurics.azure.CAM.162", - "category": "Cloud Assets Management", + "category": "Compliance Validation", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_cosmosdb_account/accurics.azure.NS.32.json b/pkg/policies/opa/rego/azure/azurerm_cosmosdb_account/accurics.azure.NS.32.json index 0bb29266c..a43405950 100755 --- a/pkg/policies/opa/rego/azure/azurerm_cosmosdb_account/accurics.azure.NS.32.json +++ b/pkg/policies/opa/rego/azure/azurerm_cosmosdb_account/accurics.azure.NS.32.json @@ -7,6 +7,6 @@ "severity": "HIGH", "description": "Ensure to filter source Ips for Cosmos DB Account", "reference_id": "accurics.azure.NS.32", - "category": "Network Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_key_vault/accurics.azure.EKM.164.json b/pkg/policies/opa/rego/azure/azurerm_key_vault/accurics.azure.EKM.164.json index 26d27562c..ef5a554f7 100755 --- a/pkg/policies/opa/rego/azure/azurerm_key_vault/accurics.azure.EKM.164.json +++ b/pkg/policies/opa/rego/azure/azurerm_key_vault/accurics.azure.EKM.164.json @@ -7,6 +7,6 @@ "severity": "MEDIUM", "description": "Ensure the key vault is recoverable - enable \"Soft Delete\" setting for a Key Vault", "reference_id": "accurics.azure.EKM.164", - "category": "Encryption and Key Management", + "category": "Data Protection", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_key_vault/accurics.azure.EKM.20.json b/pkg/policies/opa/rego/azure/azurerm_key_vault/accurics.azure.EKM.20.json index 8838c308a..ab5644012 100755 --- a/pkg/policies/opa/rego/azure/azurerm_key_vault/accurics.azure.EKM.20.json +++ b/pkg/policies/opa/rego/azure/azurerm_key_vault/accurics.azure.EKM.20.json @@ -7,6 +7,6 @@ "severity": "HIGH", "description": "Ensure that logging for Azure KeyVault is 'Enabled'", "reference_id": "accurics.azure.EKM.20", - "category": "Encryption and Key Management", + "category": "Logging and Monitoring", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_key_vault_key/accurics.azure.EKM.25.json b/pkg/policies/opa/rego/azure/azurerm_key_vault_key/accurics.azure.EKM.25.json index b62d7c09a..3fdb26c05 100755 --- a/pkg/policies/opa/rego/azure/azurerm_key_vault_key/accurics.azure.EKM.25.json +++ b/pkg/policies/opa/rego/azure/azurerm_key_vault_key/accurics.azure.EKM.25.json @@ -7,6 +7,6 @@ "severity": "HIGH", "description": "Ensure that the expiration date is set on all keys", "reference_id": "accurics.azure.EKM.25", - "category": "Key Management", + "category": "Data Protection", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_key_vault_secret/accurics.azure.EKM.26.json b/pkg/policies/opa/rego/azure/azurerm_key_vault_secret/accurics.azure.EKM.26.json index 3db60840a..2388ebb70 100755 --- a/pkg/policies/opa/rego/azure/azurerm_key_vault_secret/accurics.azure.EKM.26.json +++ b/pkg/policies/opa/rego/azure/azurerm_key_vault_secret/accurics.azure.EKM.26.json @@ -7,6 +7,6 @@ "severity": "HIGH", "description": "Ensure that the expiration date is set on all secrets", "reference_id": "accurics.azure.EKM.26", - "category": "Key Management", + "category": "Data Protection", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_kubernetes_cluster/accurics.azure.NS.382.json b/pkg/policies/opa/rego/azure/azurerm_kubernetes_cluster/accurics.azure.NS.382.json index 9a43c0a4f..67ffc0e9e 100755 --- a/pkg/policies/opa/rego/azure/azurerm_kubernetes_cluster/accurics.azure.NS.382.json +++ b/pkg/policies/opa/rego/azure/azurerm_kubernetes_cluster/accurics.azure.NS.382.json @@ -5,6 +5,6 @@ "severity": "MEDIUM", "description": "Ensure AKS cluster has Network Policy configured.", "reference_id": "accurics.azure.NS.382", - "category": "Network Security", + "category": "Infrastructure Security", "version": 1 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_kubernetes_cluster/accurics.azure.NS.383.json b/pkg/policies/opa/rego/azure/azurerm_kubernetes_cluster/accurics.azure.NS.383.json index 4d4b83855..cbf3b3db5 100755 --- a/pkg/policies/opa/rego/azure/azurerm_kubernetes_cluster/accurics.azure.NS.383.json +++ b/pkg/policies/opa/rego/azure/azurerm_kubernetes_cluster/accurics.azure.NS.383.json @@ -5,6 +5,6 @@ "severity": "MEDIUM", "description": "Ensure Kube Dashboard is disabled", "reference_id": "accurics.azure.NS.383", - "category": "Network Security", + "category": "Infrastructure Security", "version": 1 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_managed_disk/accurics.azure.EKM.156.json b/pkg/policies/opa/rego/azure/azurerm_managed_disk/accurics.azure.EKM.156.json index bfb3f8036..365f7e096 100755 --- a/pkg/policies/opa/rego/azure/azurerm_managed_disk/accurics.azure.EKM.156.json +++ b/pkg/policies/opa/rego/azure/azurerm_managed_disk/accurics.azure.EKM.156.json @@ -7,6 +7,6 @@ "severity": "MEDIUM", "description": "Ensure that 'OS disk' are encrypted", "reference_id": "accurics.azure.EKM.156", - "category": "Encryption and Key Management", + "category": "Data Protection", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_mssql_server/accurics.azure.LOG.357.json b/pkg/policies/opa/rego/azure/azurerm_mssql_server/accurics.azure.LOG.357.json index 2d0a5d83b..3de180f5f 100755 --- a/pkg/policies/opa/rego/azure/azurerm_mssql_server/accurics.azure.LOG.357.json +++ b/pkg/policies/opa/rego/azure/azurerm_mssql_server/accurics.azure.LOG.357.json @@ -8,6 +8,6 @@ "severity": "MEDIUM", "description": "Ensure that 'Auditing' Retention is 'greater than 90 days' for MSSQL servers.", "reference_id": "accurics.azure.LOG.357", - "category": "Monitoring", + "category": "Logging and Monitoring", "version": 1 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_mssql_server/accurics.azure.MON.355.json b/pkg/policies/opa/rego/azure/azurerm_mssql_server/accurics.azure.MON.355.json index 096464df7..336821d1e 100755 --- a/pkg/policies/opa/rego/azure/azurerm_mssql_server/accurics.azure.MON.355.json +++ b/pkg/policies/opa/rego/azure/azurerm_mssql_server/accurics.azure.MON.355.json @@ -8,6 +8,6 @@ "severity": "MEDIUM", "description": "Ensure that 'Auditing' is set to 'On' for MSSQL servers", "reference_id": "accurics.azure.MON.355", - "category": "Monitoring", + "category": "Logging and Monitoring", "version": 1 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_mysql_server/accurics.azure.NS.361.json b/pkg/policies/opa/rego/azure/azurerm_mysql_server/accurics.azure.NS.361.json index b70ab3a52..eec1f56d7 100755 --- a/pkg/policies/opa/rego/azure/azurerm_mysql_server/accurics.azure.NS.361.json +++ b/pkg/policies/opa/rego/azure/azurerm_mysql_server/accurics.azure.NS.361.json @@ -5,6 +5,6 @@ "severity": "HIGH", "description": "Ensure 'Enforce SSL connection' is set to 'ENABLED' for MySQL Database Server.", "reference_id": "accurics.azure.NS.361", - "category": "Network Security", + "category": "Infrastructure Security", "version": 1 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.100.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.100.json index a08d92020..8f30623e3 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.100.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.100.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Puppet Master (TCP:8140) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.100", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.101.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.101.json index 491a84e74..ca382edde 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.101.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.101.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Puppet Master (TCP:8140) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.101", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.102.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.102.json index 4052ddfad..be6aa8944 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.102.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.102.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "SMTP (TCP:25) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.102", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.103.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.103.json index 01a6a3877..aa117b29b 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.103.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.103.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "SMTP (TCP:25) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.103", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.104.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.104.json index ebb8e8fa3..1435f12b5 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.104.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.104.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "SNMP (UDP:161) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.104", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.105.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.105.json index 62f45822a..6842e82f7 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.105.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.105.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "SNMP (UDP:161) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.105", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.106.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.106.json index 5491b8b42..7983fb571 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.106.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.106.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "SQL Server Analysis (TCP:2382) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.106", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.107.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.107.json index 3f3d15add..793d66293 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.107.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.107.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "SQL Server Analysis (TCP:2382) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.107", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.108.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.108.json index 49fd9ad7c..14b6e8ab1 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.108.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.108.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "SQL Server Analysis (TCP:2383) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.108", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.109.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.109.json index 4b1ceb4a9..35f2a563d 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.109.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.109.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "SQL Server Analysis (TCP:2383) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.109", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.110.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.110.json index bc8f955d6..bb376d176 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.110.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.110.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "SaltStack Master (TCP:4505) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.110", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.111.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.111.json index e3a67ce27..4796adee1 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.111.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.111.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "SaltStack Master (TCP:4505) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.111", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.112.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.112.json index 55b15b818..a870fc62c 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.112.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.112.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "SaltStack Master (TCP:4506) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.112", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.113.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.113.json index 9e9ef8972..79674023d 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.113.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.113.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "SaltStack Master (TCP:4506) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.113", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.114.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.114.json index 6d370bca9..f8018e348 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.114.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.114.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Telnet (TCP:23) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.114", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.115.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.115.json index dabc8d586..dc11164a9 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.115.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.115.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Telnet (TCP:23) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.115", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.116.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.116.json index 724ba67c5..1164b7d08 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.116.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.116.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "VNC Listener (TCP:5500) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.116", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.117.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.117.json index 5ccc2d46c..5a2a0baeb 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.117.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.117.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "VNC Listener (TCP:5500) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.117", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.118.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.118.json index b8020fa82..b307a12de 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.118.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.118.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "VNC Server (TCP:5900) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.118", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.119.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.119.json index a8fa9f777..4ddc6e01b 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.119.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.119.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "VNC Server (TCP:5900) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.119", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.170.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.170.json index 5c8a965bc..e15b618d8 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.170.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.170.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "CiscoSecure, WebSM (TCP:9090) is exposed to the entire public internet", "reference_id": "accurics.azure.NPS.170", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.171.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.171.json index d76bba655..c692cc559 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.171.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.171.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Remote Desktop (TCP:3389) is exposed to the entire public internet", "reference_id": "accurics.azure.NPS.171", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.172.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.172.json index 120e76cfb..de09a2b53 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.172.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.172.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "SSH (TCP:22) is exposed to the entire public internet", "reference_id": "accurics.azure.NPS.172", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.173.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.173.json index d65ab4cc8..9b6897e6c 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.173.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.173.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "CIFS / SMB (TCP:3020) is exposed to small Public network", "reference_id": "accurics.azure.NPS.173", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.174.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.174.json index 35407bcbe..53550e5cf 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.174.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.174.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "CIFS / SMB (TCP:3020) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.174", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.175.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.175.json index d47fdc90a..9aadacbc9 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.175.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.175.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Cassandra (TCP:7001) is exposed to small Public network", "reference_id": "accurics.azure.NPS.175", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.176.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.176.json index c4f6e5895..385bfc50a 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.176.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.176.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Cassandra (TCP:7001) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.176", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.177.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.177.json index 5c4a93356..d0eeaf870 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.177.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.177.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Cassandra OpsCenter (TCP:61621) is exposed to small Public network", "reference_id": "accurics.azure.NPS.177", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.178.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.178.json index 5427c1d04..782aa6090 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.178.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.178.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Cassandra OpsCenter (TCP:61621) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.178", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.179.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.179.json index 7ecfbe040..922e1c117 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.179.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.179.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "DNS (UDP:53) is exposed to small Public network", "reference_id": "accurics.azure.NPS.179", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.180.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.180.json index e479544b4..e42f19f4f 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.180.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.180.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "DNS (UDP:53) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.180", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.181.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.181.json index c782f0dd2..747601b24 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.181.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.181.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Hadoop Name Node (TCP:9000) is exposed to small Public network", "reference_id": "accurics.azure.NPS.181", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.182.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.182.json index ba5b2119a..40bd25130 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.182.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.182.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Hadoop Name Node (TCP:9000) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.182", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.183.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.183.json index dd37c85a1..59c9056bf 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.183.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.183.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": " Known internal web port (TCP:8000) is exposed to small Public network", "reference_id": "accurics.azure.NPS.183", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.184.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.184.json index e03367326..0d5cb3bdb 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.184.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.184.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": " Known internal web port (TCP:8000) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.184", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.185.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.185.json index 58bd7ae7c..86957f305 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.185.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.185.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": " Known internal web port (TCP:8080) is exposed to small Public network", "reference_id": "accurics.azure.NPS.185", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.186.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.186.json index bbd4866b0..a057b9814 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.186.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.186.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": " Known internal web port (TCP:8080) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.186", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.187.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.187.json index 776e28c8a..b37f64bbf 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.187.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.187.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "LDAP SSL (TCP:636) is exposed to small Public network", "reference_id": "accurics.azure.NPS.187", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.188.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.188.json index 3bc3c0adc..eb6fa04c0 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.188.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.188.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "LDAP SSL (TCP:636) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.188", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.189.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.189.json index fec6a7001..699eb2182 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.189.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.189.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "MSSQL Admin (TCP:1434) is exposed to small Public network", "reference_id": "accurics.azure.NPS.189", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.190.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.190.json index cf02673d3..b45d74a95 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.190.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.190.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "MSSQL Admin (TCP:1434) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.190", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.191.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.191.json index 91b186e26..b9b3eedcd 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.191.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.191.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "MSSQL Browser (UDP:1434) is exposed to small Public network", "reference_id": "accurics.azure.NPS.191", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.192.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.192.json index b51160f03..6e05e582b 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.192.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.192.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "MSSQL Browser (UDP:1434) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.192", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.193.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.193.json index 8cd6382c9..f0aa9afa3 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.193.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.193.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "MSSQL Debugger (TCP:135) is exposed to small Public network", "reference_id": "accurics.azure.NPS.193", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.194.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.194.json index 8a5e4a906..848500fdf 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.194.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.194.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "MSSQL Debugger (TCP:135) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.194", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.195.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.195.json index de0b49a48..9ecabfc88 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.195.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.195.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "MSSQL Server (TCP:1433) is exposed to small Public network", "reference_id": "accurics.azure.NPS.195", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.196.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.196.json index 9f1413367..3b014bc2b 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.196.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.196.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "MSSQL Server (TCP:1433) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.196", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.197.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.197.json index b86f9d089..8d368f608 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.197.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.197.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Memcached SSL (TCP:11214) is exposed to small Public network", "reference_id": "accurics.azure.NPS.197", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.198.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.198.json index 0f328276d..de3960341 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.198.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.198.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Memcached SSL (TCP:11214) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.198", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.199.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.199.json index 6db41a81a..39533614b 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.199.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.199.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Memcached SSL (TCP:11215) is exposed to small Public network", "reference_id": "accurics.azure.NPS.199", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.200.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.200.json index 78e478c60..ed9d56a65 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.200.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.200.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Memcached SSL (TCP:11215) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.200", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.201.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.201.json index 6408236b7..890c625cd 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.201.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.201.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Memcached SSL (UDP:11214) is exposed to small Public network", "reference_id": "accurics.azure.NPS.201", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.202.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.202.json index b63a1ccd1..b1192691f 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.202.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.202.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Memcached SSL (UDP:11214) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.202", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.203.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.203.json index ae6c514f8..a44763cad 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.203.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.203.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Memcached SSL (UDP:11215) is exposed to small Public network", "reference_id": "accurics.azure.NPS.203", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.204.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.204.json index 0b88a6b36..69b97ae34 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.204.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.204.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Memcached SSL (UDP:11215) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.204", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.205.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.205.json index 051452bf4..a108c9d12 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.205.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.205.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Microsoft-DS (TCP:445) is exposed to small Public network", "reference_id": "accurics.azure.NPS.205", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.206.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.206.json index d8fcdb209..c7f9de2d3 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.206.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.206.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Microsoft-DS (TCP:445) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.206", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.207.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.207.json index 4d0126da2..6765335ed 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.207.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.207.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Mongo Web Portal (TCP:27018) is exposed to small Public network", "reference_id": "accurics.azure.NPS.207", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.208.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.208.json index c73b502f0..e6ee87569 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.208.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.208.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Mongo Web Portal (TCP:27018) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.208", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.209.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.209.json index 0a425c3f6..3cc1ee830 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.209.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.209.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "MySQL (TCP:3306) is exposed to small Public network", "reference_id": "accurics.azure.NPS.209", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.210.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.210.json index ec3db9806..f6ae3a4ab 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.210.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.210.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "MySQL (TCP:3306) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.210", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.211.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.211.json index 04a8733d1..a9b1abce5 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.211.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.211.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "NetBIOS Name Service (TCP:137) is exposed to small Public network", "reference_id": "accurics.azure.NPS.211", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.212.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.212.json index 3349d02cf..0ea55d32c 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.212.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.212.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "NetBIOS Name Service (TCP:137) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.212", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.213.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.213.json index 6e56b1f07..aa7ad6238 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.213.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.213.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "NetBIOS Name Service (UDP:137) is exposed to small Public network", "reference_id": "accurics.azure.NPS.213", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.214.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.214.json index 6b34a29ff..ace8988a7 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.214.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.214.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "NetBIOS Name Service (UDP:137) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.214", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.215.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.215.json index feb52408f..176ce754b 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.215.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.215.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "NetBIOS Datagram Service (TCP:138) is exposed to small Public network", "reference_id": "accurics.azure.NPS.215", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.216.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.216.json index 4a6213eda..ae308d29d 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.216.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.216.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "NetBIOS Datagram Service (TCP:138) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.216", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.217.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.217.json index b1776ab10..c701889bd 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.217.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.217.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "NetBIOS Datagram Service (UDP:138) is exposed to small Public network", "reference_id": "accurics.azure.NPS.217", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.218.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.218.json index bb6529898..d0f2e59f5 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.218.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.218.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "NetBIOS Datagram Service (UDP:138) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.218", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.219.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.219.json index 052198ec7..a898914a1 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.219.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.219.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "NetBIOS Session Service (TCP:139) is exposed to small Public network", "reference_id": "accurics.azure.NPS.219", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.220.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.220.json index aa251367e..2c0ac9cf5 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.220.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.220.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "NetBIOS Session Service (TCP:139) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.220", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.221.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.221.json index 53663d6b4..84a898fe6 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.221.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.221.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "NetBIOS Session Service (UDP:139) is exposed to small Public network", "reference_id": "accurics.azure.NPS.221", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.222.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.222.json index 4df402b9e..9230e4913 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.222.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.222.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "NetBIOS Session Service (UDP:139) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.222", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.223.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.223.json index 00d02aa60..bf5152a84 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.223.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.223.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Oracle DB SSL (TCP:2484) is exposed to small Public network", "reference_id": "accurics.azure.NPS.223", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.224.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.224.json index dedf070d6..a24e406a1 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.224.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.224.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Oracle DB SSL (TCP:2484) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.224", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.225.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.225.json index de1885880..9010cadea 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.225.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.225.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Oracle DB SSL (UDP:2484) is exposed to small Public network", "reference_id": "accurics.azure.NPS.225", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.226.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.226.json index bfa52f3a0..d8984b5a0 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.226.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.226.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Oracle DB SSL (UDP:2484) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.226", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.227.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.227.json index 5c0d4e8ab..769a6359d 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.227.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.227.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "POP3 (TCP:110) is exposed to small Public network", "reference_id": "accurics.azure.NPS.227", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.228.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.228.json index da582bf4f..72307d557 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.228.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.228.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "POP3 (TCP:110) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.228", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.229.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.229.json index 2f6d417e9..c97cdc34f 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.229.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.229.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "PostgreSQL (TCP:5432) is exposed to small Public network", "reference_id": "accurics.azure.NPS.229", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.230.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.230.json index dcbaa095a..7221feedc 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.230.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.230.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "PostgreSQL (TCP:5432) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.230", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.231.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.231.json index 81d0c60b0..791a8123e 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.231.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.231.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "PostgreSQL (UDP:5432) is exposed to small Public network", "reference_id": "accurics.azure.NPS.231", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.232.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.232.json index 48d5195e5..5412aa5da 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.232.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.232.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "PostgreSQL (UDP:5432) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.232", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.233.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.233.json index 23bfb5139..5a0047fba 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.233.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.233.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Prevalent known internal port (TCP:3000) is exposed to small Public network", "reference_id": "accurics.azure.NPS.233", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.234.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.234.json index 1fdd82eb8..d8dd2c6fb 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.234.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.234.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Prevalent known internal port (TCP:3000) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.234", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.235.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.235.json index 535f0c6a7..916a6a308 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.235.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.235.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Puppet Master (TCP:8140) is exposed to small Public network", "reference_id": "accurics.azure.NPS.235", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.236.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.236.json index 1564c8f14..aafa616b1 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.236.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.236.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Puppet Master (TCP:8140) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.236", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.237.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.237.json index a48cf577b..64305a6e8 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.237.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.237.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "SMTP (TCP:25) is exposed to small Public network", "reference_id": "accurics.azure.NPS.237", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.238.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.238.json index 475c48c1d..4b8e854bf 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.238.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.238.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "SMTP (TCP:25) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.238", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.239.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.239.json index 5930e5a3e..5a4b1e309 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.239.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.239.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "SNMP (UDP:161) is exposed to small Public network", "reference_id": "accurics.azure.NPS.239", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.240.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.240.json index f20d95d44..5f411b979 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.240.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.240.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "SNMP (UDP:161) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.240", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.241.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.241.json index 050f41d94..ed0d7e708 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.241.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.241.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "SQL Server Analysis (TCP:2382) is exposed to small Public network", "reference_id": "accurics.azure.NPS.241", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.242.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.242.json index e079c8166..bdf32c528 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.242.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.242.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "SQL Server Analysis (TCP:2382) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.242", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.243.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.243.json index 5fc0e0a4f..4bec78ce0 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.243.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.243.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "SQL Server Analysis (TCP:2383) is exposed to small Public network", "reference_id": "accurics.azure.NPS.243", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.244.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.244.json index 0ea2cd2e2..6b673da88 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.244.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.244.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "SQL Server Analysis (TCP:2383) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.244", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.245.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.245.json index 3bea5ba93..a63a2c527 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.245.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.245.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "SaltStack Master (TCP:4505) is exposed to small Public network", "reference_id": "accurics.azure.NPS.245", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.246.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.246.json index 472351a48..8b3e99bc3 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.246.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.246.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "SaltStack Master (TCP:4505) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.246", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.247.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.247.json index df75dd102..edcf3566d 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.247.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.247.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "SaltStack Master (TCP:4506) is exposed to small Public network", "reference_id": "accurics.azure.NPS.247", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.248.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.248.json index 7bb85e5ea..1041a93a9 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.248.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.248.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "SaltStack Master (TCP:4506) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.248", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.249.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.249.json index 895ae823c..e429404d9 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.249.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.249.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Telnet (TCP:23) is exposed to small Public network", "reference_id": "accurics.azure.NPS.249", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.250.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.250.json index 49ea49dac..4f37e4a51 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.250.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.250.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "Telnet (TCP:23) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.250", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.251.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.251.json index 4e8f286c2..da5aadbaa 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.251.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.251.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "VNC Listener (TCP:5500) is exposed to small Public network", "reference_id": "accurics.azure.NPS.251", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.252.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.252.json index 0e97923a6..d72f6d5b5 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.252.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.252.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "VNC Listener (TCP:5500) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.252", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.253.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.253.json index 1bc84985d..1cadbb5b6 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.253.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.253.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "VNC Server (TCP:5900) is exposed to small Public network", "reference_id": "accurics.azure.NPS.253", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.254.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.254.json index 54371c135..eb7ca883c 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.254.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.254.json @@ -13,6 +13,6 @@ "severity": "MEDIUM", "description": "VNC Server (TCP:5900) is exposed to wide Private network", "reference_id": "accurics.azure.NPS.254", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.275.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.275.json index 5547c0892..eda60ae34 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.275.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.275.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "CIFS / SMB (TCP:3020) is exposed to small Private network", "reference_id": "accurics.azure.NPS.275", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.276.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.276.json index 09ccd2dc0..c7ec9e1ae 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.276.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.276.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "Cassandra (TCP:7001) is exposed to small Private network", "reference_id": "accurics.azure.NPS.276", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.277.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.277.json index 8aaa75393..a8caba275 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.277.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.277.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "Cassandra OpsCenter (TCP:61621) is exposed to small Private network", "reference_id": "accurics.azure.NPS.277", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.278.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.278.json index b7b03f3b5..cc6d5bbeb 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.278.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.278.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "DNS (UDP:53) is exposed to small Private network", "reference_id": "accurics.azure.NPS.278", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.279.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.279.json index 8502cd27b..d3a1189de 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.279.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.279.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "Hadoop Name Node (TCP:9000) is exposed to small Private network", "reference_id": "accurics.azure.NPS.279", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.280.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.280.json index 725ed7594..452381e35 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.280.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.280.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": " Known internal web port (TCP:8000) is exposed to small Private network", "reference_id": "accurics.azure.NPS.280", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.281.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.281.json index 2188a0095..fa16432a4 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.281.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.281.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": " Known internal web port (TCP:8080) is exposed to small Private network", "reference_id": "accurics.azure.NPS.281", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.282.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.282.json index a6a786bfa..54273683a 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.282.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.282.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "LDAP SSL (TCP:636) is exposed to small Private network", "reference_id": "accurics.azure.NPS.282", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.283.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.283.json index 5cb3622d9..c10c2b2a6 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.283.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.283.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "MSSQL Admin (TCP:1434) is exposed to small Private network", "reference_id": "accurics.azure.NPS.283", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.284.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.284.json index 67ee9267a..418a12687 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.284.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.284.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "MSSQL Browser (UDP:1434) is exposed to small Private network", "reference_id": "accurics.azure.NPS.284", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.285.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.285.json index 7de5d81cd..59c0bc01b 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.285.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.285.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "MSSQL Debugger (TCP:135) is exposed to small Private network", "reference_id": "accurics.azure.NPS.285", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.286.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.286.json index f1e91e23e..e4eb1a24c 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.286.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.286.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "MSSQL Server (TCP:1433) is exposed to small Private network", "reference_id": "accurics.azure.NPS.286", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.287.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.287.json index c7981063e..a5e22cd8f 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.287.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.287.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "Memcached SSL (TCP:11214) is exposed to small Private network", "reference_id": "accurics.azure.NPS.287", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.288.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.288.json index 73ecf0055..4e25ba175 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.288.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.288.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "Memcached SSL (TCP:11215) is exposed to small Private network", "reference_id": "accurics.azure.NPS.288", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.289.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.289.json index d8563d31f..03e141cb2 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.289.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.289.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "Memcached SSL (UDP:11214) is exposed to small Private network", "reference_id": "accurics.azure.NPS.289", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.290.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.290.json index 0b5f5b6c1..e71e40044 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.290.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.290.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "Memcached SSL (UDP:11215) is exposed to small Private network", "reference_id": "accurics.azure.NPS.290", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.291.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.291.json index 64c9d76db..64ac8affd 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.291.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.291.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "Microsoft-DS (TCP:445) is exposed to small Private network", "reference_id": "accurics.azure.NPS.291", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.292.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.292.json index c10921671..89a87d303 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.292.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.292.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "Mongo Web Portal (TCP:27018) is exposed to small Private network", "reference_id": "accurics.azure.NPS.292", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.293.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.293.json index 970b6a56b..49d686045 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.293.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.293.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "MySQL (TCP:3306) is exposed to small Private network", "reference_id": "accurics.azure.NPS.293", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.294.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.294.json index 78d7f4228..df64b806a 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.294.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.294.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "NetBIOS Name Service (TCP:137) is exposed to small Private network", "reference_id": "accurics.azure.NPS.294", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.295.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.295.json index 5c621aacf..4463f7b21 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.295.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.295.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "NetBIOS Name Service (UDP:137) is exposed to small Private network", "reference_id": "accurics.azure.NPS.295", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.296.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.296.json index 5766d2d2d..e9c279de3 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.296.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.296.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "NetBIOS Datagram Service (TCP:138) is exposed to small Private network", "reference_id": "accurics.azure.NPS.296", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.297.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.297.json index dfeedd47c..47fa43401 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.297.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.297.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "NetBIOS Datagram Service (UDP:138) is exposed to small Private network", "reference_id": "accurics.azure.NPS.297", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.298.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.298.json index bbeb2c454..76a90c7b1 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.298.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.298.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "NetBIOS Session Service (TCP:139) is exposed to small Private network", "reference_id": "accurics.azure.NPS.298", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.299.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.299.json index 87a2b223a..d4165bacd 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.299.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.299.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "NetBIOS Session Service (UDP:139) is exposed to small Private network", "reference_id": "accurics.azure.NPS.299", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.300.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.300.json index 7ba5579f2..1fde59991 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.300.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.300.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "Oracle DB SSL (TCP:2484) is exposed to small Private network", "reference_id": "accurics.azure.NPS.300", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.301.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.301.json index 2e717e5bd..1307a57b1 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.301.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.301.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "Oracle DB SSL (UDP:2484) is exposed to small Private network", "reference_id": "accurics.azure.NPS.301", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.302.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.302.json index f9b177854..79b99639f 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.302.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.302.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "POP3 (TCP:110) is exposed to small Private network", "reference_id": "accurics.azure.NPS.302", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.303.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.303.json index 690df8894..ee29f0f3e 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.303.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.303.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "PostgreSQL (TCP:5432) is exposed to small Private network", "reference_id": "accurics.azure.NPS.303", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.304.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.304.json index 19f7c7fdc..21e556f1a 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.304.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.304.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "PostgreSQL (UDP:5432) is exposed to small Private network", "reference_id": "accurics.azure.NPS.304", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.305.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.305.json index 4152b7b0d..4f0994055 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.305.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.305.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "Prevalent known internal port (TCP:3000) is exposed to small Private network", "reference_id": "accurics.azure.NPS.305", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.306.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.306.json index c3d7d66a5..ebe31c808 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.306.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.306.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "Puppet Master (TCP:8140) is exposed to small Private network", "reference_id": "accurics.azure.NPS.306", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.307.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.307.json index 38a2216b8..7b7c74dad 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.307.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.307.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "SMTP (TCP:25) is exposed to small Private network", "reference_id": "accurics.azure.NPS.307", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.308.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.308.json index 442804b36..4dec95f39 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.308.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.308.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "SNMP (UDP:161) is exposed to small Private network", "reference_id": "accurics.azure.NPS.308", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.309.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.309.json index 37a81efd7..f85a5b7f3 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.309.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.309.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "SQL Server Analysis (TCP:2382) is exposed to small Private network", "reference_id": "accurics.azure.NPS.309", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.310.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.310.json index 7a42caf10..fb1230e99 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.310.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.310.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "SQL Server Analysis (TCP:2383) is exposed to small Private network", "reference_id": "accurics.azure.NPS.310", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.311.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.311.json index 01613dc4e..8ba254ba9 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.311.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.311.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "SaltStack Master (TCP:4505) is exposed to small Private network", "reference_id": "accurics.azure.NPS.311", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.312.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.312.json index 3c1a33fa7..e15017747 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.312.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.312.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "SaltStack Master (TCP:4506) is exposed to small Private network", "reference_id": "accurics.azure.NPS.312", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.313.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.313.json index 9e23b854c..b196d55e8 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.313.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.313.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "Telnet (TCP:23) is exposed to small Private network", "reference_id": "accurics.azure.NPS.313", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.314.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.314.json index 271bb4ce9..a17d549ff 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.314.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.314.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "VNC Listener (TCP:5500) is exposed to small Private network", "reference_id": "accurics.azure.NPS.314", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.315.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.315.json index 3bc795fd2..6d83b0b35 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.315.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.315.json @@ -13,6 +13,6 @@ "severity": "LOW", "description": "VNC Server (TCP:5900) is exposed to small Private network", "reference_id": "accurics.azure.NPS.315", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.35.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.35.json index 551c54ebe..f541992b3 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.35.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.35.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "CiscoSecure, WebSM (TCP:9090) is exposed to the wide public internet", "reference_id": "accurics.azure.NPS.35", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.36.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.36.json index b40936f66..4c3b877f8 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.36.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.36.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Remote Desktop (TCP:3389) is exposed to the wide public internet", "reference_id": "accurics.azure.NPS.36", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.37.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.37.json index d22d8a4f8..86441148f 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.37.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.37.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "SSH (TCP:22) is exposed to the wide public internet", "reference_id": "accurics.azure.NPS.37", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.38.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.38.json index 807e4331a..9047763a2 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.38.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.38.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "CIFS / SMB (TCP:3020) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.38", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.39.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.39.json index fcdf6d0a4..ca22f0cb6 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.39.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.39.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "CIFS / SMB (TCP:3020) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.39", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.40.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.40.json index 5de920a46..01779a487 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.40.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.40.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Cassandra (TCP:7001) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.40", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.41.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.41.json index bb419a6f8..0ec87eb6a 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.41.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.41.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Cassandra (TCP:7001) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.41", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.42.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.42.json index 73897d0cb..30ad75692 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.42.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.42.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Cassandra OpsCenter (TCP:61621) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.42", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.43.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.43.json index 94be52a77..0e65ebe5b 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.43.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.43.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Cassandra OpsCenter (TCP:61621) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.43", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.44.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.44.json index b1c2a771e..17611caa3 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.44.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.44.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "DNS (UDP:53) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.44", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.45.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.45.json index 215094734..ea88aa608 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.45.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.45.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "DNS (UDP:53) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.45", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.46.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.46.json index f3cc9c782..3936a71c0 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.46.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.46.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Hadoop Name Node (TCP:9000) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.46", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.47.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.47.json index 1fb6d20ce..072d6049d 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.47.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.47.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Hadoop Name Node (TCP:9000) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.47", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.48.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.48.json index ec50e4747..c32187d41 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.48.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.48.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": " Known internal web port (TCP:8000) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.48", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.49.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.49.json index fbd9c5c37..c74846556 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.49.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.49.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": " Known internal web port (TCP:8000) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.49", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.50.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.50.json index 1302bd998..40f5a90ef 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.50.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.50.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": " Known internal web port (TCP:8080) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.50", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.51.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.51.json index 53254ea21..2fdd59149 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.51.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.51.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": " Known internal web port (TCP:8080) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.51", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.52.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.52.json index 674bd2d35..cbfce3ae5 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.52.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.52.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "LDAP SSL (TCP:636) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.52", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.53.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.53.json index 113023c2f..e1f72fc5e 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.53.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.53.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "LDAP SSL (TCP:636) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.53", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.54.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.54.json index f261038a7..3ac5484ed 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.54.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.54.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "MSSQL Admin (TCP:1434) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.54", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.55.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.55.json index 6ed894d61..5ef88ba2c 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.55.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.55.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "MSSQL Admin (TCP:1434) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.55", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.56.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.56.json index d5d8d8b53..e81f066e8 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.56.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.56.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "MSSQL Browser (UDP:1434) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.56", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.57.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.57.json index b140a307c..521d7dfdb 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.57.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.57.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "MSSQL Browser (UDP:1434) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.57", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.58.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.58.json index c757173b5..e769d8ec9 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.58.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.58.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "MSSQL Debugger (TCP:135) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.58", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.59.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.59.json index 41187896f..19a43a2cd 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.59.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.59.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "MSSQL Debugger (TCP:135) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.59", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.60.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.60.json index e4b89918d..7b94d60b8 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.60.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.60.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "MSSQL Server (TCP:1433) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.60", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.61.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.61.json index 6f760513d..f45359b8e 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.61.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.61.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "MSSQL Server (TCP:1433) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.61", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.62.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.62.json index 0e96149dd..fa2304a8e 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.62.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.62.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Memcached SSL (TCP:11214) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.62", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.63.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.63.json index f8ebeff60..66f9105e2 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.63.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.63.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Memcached SSL (TCP:11214) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.63", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.64.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.64.json index 09b9425d5..59cdddff2 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.64.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.64.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Memcached SSL (TCP:11215) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.64", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.65.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.65.json index 8bf9e8be7..5f223989a 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.65.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.65.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Memcached SSL (TCP:11215) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.65", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.66.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.66.json index 1ede5f1b9..9471d9ea9 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.66.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.66.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Memcached SSL (UDP:11214) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.66", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.67.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.67.json index e50a95028..7b4670186 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.67.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.67.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Memcached SSL (UDP:11214) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.67", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.68.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.68.json index ba85e6c27..c6b532814 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.68.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.68.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Memcached SSL (UDP:11215) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.68", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.69.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.69.json index 71e963466..4e9faab0c 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.69.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.69.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Memcached SSL (UDP:11215) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.69", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.70.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.70.json index 13ff31195..1aac9db20 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.70.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.70.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Microsoft-DS (TCP:445) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.70", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.71.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.71.json index 3be3c53e5..a20dcb1d9 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.71.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.71.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Microsoft-DS (TCP:445) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.71", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.72.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.72.json index c5d0deb54..e2425d4f4 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.72.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.72.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Mongo Web Portal (TCP:27018) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.72", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.73.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.73.json index f210bf838..382c9ab5b 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.73.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.73.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Mongo Web Portal (TCP:27018) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.73", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.74.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.74.json index 856c56f2a..bc984972c 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.74.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.74.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "MySQL (TCP:3306) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.74", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.75.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.75.json index 1af0a93a7..aa4cd9ed2 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.75.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.75.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "MySQL (TCP:3306) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.75", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.76.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.76.json index 830c14b77..4fdd48061 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.76.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.76.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "NetBIOS Name Service (TCP:137) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.76", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.77.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.77.json index 964516086..86e8f9619 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.77.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.77.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "NetBIOS Name Service (TCP:137) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.77", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.78.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.78.json index 2fa2e83e8..c2a747e89 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.78.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.78.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "NetBIOS Name Service (UDP:137) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.78", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.79.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.79.json index da9d2918c..05a693650 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.79.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.79.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "NetBIOS Name Service (UDP:137) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.79", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.80.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.80.json index d3ac559d8..92a31a8d7 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.80.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.80.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "NetBIOS Datagram Service (TCP:138) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.80", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.81.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.81.json index b66bdd50a..013de4be0 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.81.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.81.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "NetBIOS Datagram Service (TCP:138) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.81", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.82.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.82.json index d71f1e131..6fe1c3363 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.82.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.82.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "NetBIOS Datagram Service (UDP:138) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.82", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.83.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.83.json index 1e8cd9049..53dc0594d 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.83.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.83.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "NetBIOS Datagram Service (UDP:138) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.83", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.84.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.84.json index 0ec3c88b5..7211c37f5 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.84.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.84.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "NetBIOS Session Service (TCP:139) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.84", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.85.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.85.json index 67ae72a86..8f3cc4c47 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.85.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.85.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "NetBIOS Session Service (TCP:139) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.85", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.86.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.86.json index 2ca4b56fa..efd520f74 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.86.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.86.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "NetBIOS Session Service (UDP:139) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.86", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.87.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.87.json index b9f3973b7..17edad2a4 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.87.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.87.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "NetBIOS Session Service (UDP:139) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.87", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.88.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.88.json index 8ce6141bf..6fdf11c39 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.88.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.88.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Oracle DB SSL (TCP:2484) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.88", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.89.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.89.json index 37ff253f7..263018338 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.89.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.89.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Oracle DB SSL (TCP:2484) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.89", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.90.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.90.json index 090635ee9..68b809761 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.90.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.90.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Oracle DB SSL (UDP:2484) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.90", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.91.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.91.json index 76d2354dc..7441ba062 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.91.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.91.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Oracle DB SSL (UDP:2484) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.91", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.92.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.92.json index 34cd8cd11..4bfecb1e7 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.92.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.92.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "POP3 (TCP:110) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.92", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.93.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.93.json index 88712f593..44f137e1e 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.93.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.93.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "POP3 (TCP:110) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.93", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.94.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.94.json index 82f6b5dda..22c3a1628 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.94.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.94.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "PostgreSQL (TCP:5432) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.94", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.95.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.95.json index dc97e3a91..193799d73 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.95.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.95.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "PostgreSQL (TCP:5432) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.95", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.96.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.96.json index bba59507e..9b9fe1a90 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.96.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.96.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "PostgreSQL (UDP:5432) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.96", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.97.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.97.json index f5ed8e224..789824324 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.97.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.97.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "PostgreSQL (UDP:5432) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.97", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.98.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.98.json index f819d6b71..1bf4612ae 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.98.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.98.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Prevalent known internal port (TCP:3000) is exposed to wide Public network", "reference_id": "accurics.azure.NPS.98", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.99.json b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.99.json index 9592ce27d..624b97308 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.99.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_security_rule/accurics.azure.NPS.99.json @@ -13,6 +13,6 @@ "severity": "HIGH", "description": "Prevalent known internal port (TCP:3000) is exposed to entire Public network", "reference_id": "accurics.azure.NPS.99", - "category": "Network Ports Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_watcher_flow_log/accurics.azure.NS.11.json b/pkg/policies/opa/rego/azure/azurerm_network_watcher_flow_log/accurics.azure.NS.11.json index 69c85928a..37defbdbf 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_watcher_flow_log/accurics.azure.NS.11.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_watcher_flow_log/accurics.azure.NS.11.json @@ -7,6 +7,6 @@ "severity": "HIGH", "description": "Enable Network Watcher for Azure subscriptions. Network diagnostic and visualization tools available with Network Watcher help users understand, diagnose, and gain insights to the network in Azure.", "reference_id": "accurics.azure.NS.11", - "category": "Network Security", + "category": "Logging and Monitoring", "version": 1 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_network_watcher_flow_log/accurics.azure.NS.342.json b/pkg/policies/opa/rego/azure/azurerm_network_watcher_flow_log/accurics.azure.NS.342.json index 1e8e1fb41..1e9aa613b 100755 --- a/pkg/policies/opa/rego/azure/azurerm_network_watcher_flow_log/accurics.azure.NS.342.json +++ b/pkg/policies/opa/rego/azure/azurerm_network_watcher_flow_log/accurics.azure.NS.342.json @@ -7,6 +7,6 @@ "severity": "MEDIUM", "description": "Network Security Group Flow Logs should be enabled and the retention period is set to greater than or equal to 90 days. Flow logs enable capturing information about IP traffic flowing in and out of network security groups. Logs can be used to check for anomalies and give insight into suspected breaches.", "reference_id": "accurics.azure.NS.342", - "category": "Network Security", + "category": "Resilience", "version": 1 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.151.json b/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.151.json index b8ccaea96..2768342d2 100755 --- a/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.151.json +++ b/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.151.json @@ -7,6 +7,6 @@ "severity": "MEDIUM", "description": "Ensure server parameter 'connection_throttling' is set to 'ON' for PostgreSQL Database Server", "reference_id": "accurics.azure.LOG.151", - "category": "Logging", + "category": "Logging and Monitoring", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.152.json b/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.152.json index c166f5e99..d92cdce90 100755 --- a/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.152.json +++ b/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.152.json @@ -7,6 +7,6 @@ "severity": "MEDIUM", "description": "Ensure server parameter 'log_connections' is set to 'ON' for PostgreSQL Database Server", "reference_id": "accurics.azure.LOG.152", - "category": "Logging", + "category": "Logging and Monitoring", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.153.json b/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.153.json index 9390bf1bd..a557bbaa5 100755 --- a/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.153.json +++ b/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.153.json @@ -7,6 +7,6 @@ "severity": "MEDIUM", "description": "Ensure server parameter 'log_disconnections' is set to 'ON' for PostgreSQL Database Server", "reference_id": "accurics.azure.LOG.153", - "category": "Logging", + "category": "Logging and Monitoring", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.154.json b/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.154.json index acd4215c3..4fbc66b29 100755 --- a/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.154.json +++ b/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.154.json @@ -7,6 +7,6 @@ "severity": "MEDIUM", "description": "Ensure server parameter 'log_duration' is set to 'ON' for PostgreSQL Database Server", "reference_id": "accurics.azure.LOG.154", - "category": "Logging", + "category": "Logging and Monitoring", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.155.json b/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.155.json index 34718109a..5d528a0c0 100755 --- a/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.155.json +++ b/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.155.json @@ -7,6 +7,6 @@ "severity": "MEDIUM", "description": "Ensure server parameter 'log_retention_days' is greater than 3 days for PostgreSQL Database Server", "reference_id": "accurics.azure.LOG.155", - "category": "Logging", + "category": "Logging and Monitoring", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.364.json b/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.364.json index bb369e624..416eae363 100755 --- a/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.364.json +++ b/pkg/policies/opa/rego/azure/azurerm_postgresql_configuration/accurics.azure.LOG.364.json @@ -5,6 +5,6 @@ "severity": "MEDIUM", "description": "Ensure server parameter 'log_checkpoints' is set to 'ON' for PostgreSQL Database Server", "reference_id": "accurics.azure.LOG.364", - "category": "Logging", + "category": "Logging and Monitoring", "version": 1 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_postgresql_server/accurics.azure.BDR.163.json b/pkg/policies/opa/rego/azure/azurerm_postgresql_server/accurics.azure.BDR.163.json index 2e383392c..0d2cc9b5e 100755 --- a/pkg/policies/opa/rego/azure/azurerm_postgresql_server/accurics.azure.BDR.163.json +++ b/pkg/policies/opa/rego/azure/azurerm_postgresql_server/accurics.azure.BDR.163.json @@ -7,6 +7,6 @@ "severity": "HIGH", "description": "Ensure that Geo Redundant Backups is enabled on PostgreSQL", "reference_id": "accurics.azure.BDR.163", - "category": "Backup and Disaster Recovery", + "category": "Resilience", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_postgresql_server/accurics.azure.EKM.1.json b/pkg/policies/opa/rego/azure/azurerm_postgresql_server/accurics.azure.EKM.1.json index 29cae6e06..a88513d48 100755 --- a/pkg/policies/opa/rego/azure/azurerm_postgresql_server/accurics.azure.EKM.1.json +++ b/pkg/policies/opa/rego/azure/azurerm_postgresql_server/accurics.azure.EKM.1.json @@ -7,6 +7,6 @@ "severity": "HIGH", "description": "Ensure 'Enforce SSL connection' is set to 'ENABLED' for PostgreSQL Database Server", "reference_id": "accurics.azure.EKM.1", - "category": "Encryption and Key Management", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.EKM.23.json b/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.EKM.23.json index 201152c30..0cd495c0b 100755 --- a/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.EKM.23.json +++ b/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.EKM.23.json @@ -7,6 +7,6 @@ "severity": "MEDIUM", "description": "Ensure that the Redis Cache accepts only SSL connections", "reference_id": "accurics.azure.EKM.23", - "category": "Encryption and Key Management", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.13.json b/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.13.json index 3837ba95f..35bceb672 100755 --- a/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.13.json +++ b/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.13.json @@ -7,6 +7,6 @@ "severity": "HIGH", "description": "Ensure that Redis is updated regularly with security and operational updates.\n\nNote this feature is only available to Premium tier Redis Caches.", "reference_id": "accurics.azure.NS.13", - "category": "Network Security", + "category": "Security Best Practices", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.166.json b/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.166.json index 52e14ee6b..7fafb19e2 100755 --- a/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.166.json +++ b/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.166.json @@ -7,6 +7,6 @@ "severity": "MEDIUM", "description": "Ensure there are no firewall rules allowing Redis Cache access for a large number of source IPs", "reference_id": "accurics.azure.NS.166", - "category": "Network Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.30.json b/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.30.json index d7a03d1e8..90de11137 100755 --- a/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.30.json +++ b/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.30.json @@ -9,6 +9,6 @@ "severity": "HIGH", "description": "Ensure there are no firewall rules allowing unrestricted access to Redis from the Internet", "reference_id": "accurics.azure.NS.30", - "category": "Network Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.31.json b/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.31.json index fe51fba0a..4237f22f5 100755 --- a/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.31.json +++ b/pkg/policies/opa/rego/azure/azurerm_redis_cache/accurics.azure.NS.31.json @@ -9,6 +9,6 @@ "severity": "HIGH", "description": "Ensure there are no firewall rules allowing unrestricted access to Redis from other Azure sources", "reference_id": "accurics.azure.NS.31", - "category": "Network Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_resource_group/accurics.azure.NS.272.json b/pkg/policies/opa/rego/azure/azurerm_resource_group/accurics.azure.NS.272.json index 153c4488f..1609a2762 100755 --- a/pkg/policies/opa/rego/azure/azurerm_resource_group/accurics.azure.NS.272.json +++ b/pkg/policies/opa/rego/azure/azurerm_resource_group/accurics.azure.NS.272.json @@ -7,6 +7,6 @@ "severity": "LOW", "description": "Ensure that Azure Resource Group has resource lock enabled", "reference_id": "accurics.azure.NS.272", - "category": "Network Security", + "category": "Identity and Access Management", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_security_center_contact/accurics.azure.MON.353.json b/pkg/policies/opa/rego/azure/azurerm_security_center_contact/accurics.azure.MON.353.json index 390dc737b..ece536cd7 100755 --- a/pkg/policies/opa/rego/azure/azurerm_security_center_contact/accurics.azure.MON.353.json +++ b/pkg/policies/opa/rego/azure/azurerm_security_center_contact/accurics.azure.MON.353.json @@ -5,6 +5,6 @@ "severity": "MEDIUM", "description": "Ensure that 'Send email notification for high severity alerts' is set to 'On'", "reference_id": "accurics.azure.MON.353", - "category": "Monitoring", + "category": "Logging and Monitoring", "version": 1 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_security_center_subscription_pricing/accurics.azure.OPS.349.json b/pkg/policies/opa/rego/azure/azurerm_security_center_subscription_pricing/accurics.azure.OPS.349.json index 7da13582a..429211aa1 100755 --- a/pkg/policies/opa/rego/azure/azurerm_security_center_subscription_pricing/accurics.azure.OPS.349.json +++ b/pkg/policies/opa/rego/azure/azurerm_security_center_subscription_pricing/accurics.azure.OPS.349.json @@ -7,6 +7,6 @@ "severity": "MEDIUM", "description": "Ensure that standard pricing tiers are selected", "reference_id": "accurics.azure.OPS.349", - "category": "Operational Efficiency", + "category": "Security Best Practices", "version": 1 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_sql_active_directory_administrator/accurics.azure.IAM.137.json b/pkg/policies/opa/rego/azure/azurerm_sql_active_directory_administrator/accurics.azure.IAM.137.json index 0bcdc2c4c..f9b4cfc0d 100755 --- a/pkg/policies/opa/rego/azure/azurerm_sql_active_directory_administrator/accurics.azure.IAM.137.json +++ b/pkg/policies/opa/rego/azure/azurerm_sql_active_directory_administrator/accurics.azure.IAM.137.json @@ -7,6 +7,6 @@ "severity": "MEDIUM", "description": "Avoid using names like 'Admin' for an Azure SQL Server Active Directory Administrator account", "reference_id": "accurics.azure.IAM.137", - "category": "Identity and Access Management", + "category": "Compliance Validation", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_sql_database/accurics.azure.MON.157.json b/pkg/policies/opa/rego/azure/azurerm_sql_database/accurics.azure.MON.157.json index 359f70b6e..f2538ae02 100755 --- a/pkg/policies/opa/rego/azure/azurerm_sql_database/accurics.azure.MON.157.json +++ b/pkg/policies/opa/rego/azure/azurerm_sql_database/accurics.azure.MON.157.json @@ -7,6 +7,6 @@ "severity": "MEDIUM", "description": "Ensure that 'Threat Detection' is enabled for Azure SQL Database", "reference_id": "accurics.azure.MON.157", - "category": "Monitoring", + "category": "Logging and Monitoring", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_sql_firewall_rule/accurics.azure.NS.169.json b/pkg/policies/opa/rego/azure/azurerm_sql_firewall_rule/accurics.azure.NS.169.json index 549e2bf7c..e6e5be407 100755 --- a/pkg/policies/opa/rego/azure/azurerm_sql_firewall_rule/accurics.azure.NS.169.json +++ b/pkg/policies/opa/rego/azure/azurerm_sql_firewall_rule/accurics.azure.NS.169.json @@ -7,6 +7,6 @@ "severity": "MEDIUM", "description": "Restrict Azure SQL Server accessibility to a minimal address range", "reference_id": "accurics.azure.NS.169", - "category": "Network Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_sql_firewall_rule/accurics.azure.NS.21.json b/pkg/policies/opa/rego/azure/azurerm_sql_firewall_rule/accurics.azure.NS.21.json index 3326bd00f..91e3c9f51 100755 --- a/pkg/policies/opa/rego/azure/azurerm_sql_firewall_rule/accurics.azure.NS.21.json +++ b/pkg/policies/opa/rego/azure/azurerm_sql_firewall_rule/accurics.azure.NS.21.json @@ -9,6 +9,6 @@ "severity": "HIGH", "description": "Ensure that no SQL Server allows ingress from 0.0.0.0/0 (ANY IP)", "reference_id": "accurics.azure.NS.21", - "category": "Network Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_sql_firewall_rule/accurics.azure.NS.5.json b/pkg/policies/opa/rego/azure/azurerm_sql_firewall_rule/accurics.azure.NS.5.json index b64c3c080..538589d12 100755 --- a/pkg/policies/opa/rego/azure/azurerm_sql_firewall_rule/accurics.azure.NS.5.json +++ b/pkg/policies/opa/rego/azure/azurerm_sql_firewall_rule/accurics.azure.NS.5.json @@ -9,6 +9,6 @@ "severity": "HIGH", "description": "Ensure entire Azure infrastructure doesn't have access to Azure SQL ServerEnsure entire Azure infrastructure doesn't have access to Azure SQL Server", "reference_id": "accurics.azure.NS.5", - "category": "Network Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.IAM.138.json b/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.IAM.138.json index e42c803cd..fb0847a9c 100755 --- a/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.IAM.138.json +++ b/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.IAM.138.json @@ -7,6 +7,6 @@ "severity": "MEDIUM", "description": "Avoid using names like 'Admin' for an Azure SQL Server admin account login", "reference_id": "accurics.azure.IAM.138", - "category": "Identity and Access Management", + "category": "Compliance Validation", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.LOG.356.json b/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.LOG.356.json index 67e7cef09..0e6e8330c 100755 --- a/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.LOG.356.json +++ b/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.LOG.356.json @@ -5,6 +5,6 @@ "severity": "MEDIUM", "description": "Ensure that 'Auditing' Retention is 'greater than 90 days' for SQL servers.", "reference_id": "accurics.azure.LOG.356", - "category": "Logging", + "category": "Compliance Validation", "version": 1 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.MON.354.json b/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.MON.354.json index 1bccf29aa..8ddb5f211 100755 --- a/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.MON.354.json +++ b/pkg/policies/opa/rego/azure/azurerm_sql_server/accurics.azure.MON.354.json @@ -5,6 +5,6 @@ "severity": "MEDIUM", "description": "Ensure that 'Auditing' is set to 'On' for SQL servers", "reference_id": "accurics.azure.MON.354", - "category": "Monitoring", + "category": "Logging and Monitoring", "version": 1 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_storage_account/accurics.azure.EKM.7.json b/pkg/policies/opa/rego/azure/azurerm_storage_account/accurics.azure.EKM.7.json index f5bca5b10..fba1a484e 100755 --- a/pkg/policies/opa/rego/azure/azurerm_storage_account/accurics.azure.EKM.7.json +++ b/pkg/policies/opa/rego/azure/azurerm_storage_account/accurics.azure.EKM.7.json @@ -7,6 +7,6 @@ "severity": "HIGH", "description": "Ensure that 'Secure transfer required' is enabled for Storage Accounts", "reference_id": "accurics.azure.EKM.7", - "category": "Encryption and Key Management", + "category": "Data Protection", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_storage_account/accurics.azure.NS.2.json b/pkg/policies/opa/rego/azure/azurerm_storage_account/accurics.azure.NS.2.json index aba7ae27b..79e593dc4 100755 --- a/pkg/policies/opa/rego/azure/azurerm_storage_account/accurics.azure.NS.2.json +++ b/pkg/policies/opa/rego/azure/azurerm_storage_account/accurics.azure.NS.2.json @@ -7,6 +7,6 @@ "severity": "HIGH", "description": "Ensure 'Trusted Microsoft Services' is enabled for Storage Account access", "reference_id": "accurics.azure.NS.2", - "category": "Network Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_storage_account/accurics.azure.NS.4.json b/pkg/policies/opa/rego/azure/azurerm_storage_account/accurics.azure.NS.4.json index 4eb41fe78..28ab0e8e4 100755 --- a/pkg/policies/opa/rego/azure/azurerm_storage_account/accurics.azure.NS.4.json +++ b/pkg/policies/opa/rego/azure/azurerm_storage_account/accurics.azure.NS.4.json @@ -7,6 +7,6 @@ "severity": "HIGH", "description": "Ensure default network access rule for Storage Accounts is not open to public", "reference_id": "accurics.azure.NS.4", - "category": "Network Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file diff --git a/pkg/policies/opa/rego/azure/azurerm_virtual_network/accurics.azure.NS.161.json b/pkg/policies/opa/rego/azure/azurerm_virtual_network/accurics.azure.NS.161.json index 907585538..4a6e8ae1e 100755 --- a/pkg/policies/opa/rego/azure/azurerm_virtual_network/accurics.azure.NS.161.json +++ b/pkg/policies/opa/rego/azure/azurerm_virtual_network/accurics.azure.NS.161.json @@ -7,6 +7,6 @@ "severity": "MEDIUM", "description": "Ensure that Azure Virtual Network subnet is configured with a Network Security Group", "reference_id": "accurics.azure.NS.161", - "category": "Network Security", + "category": "Infrastructure Security", "version": 2 } \ No newline at end of file